- 2021
- Malik Zia Ullah Bashir
, Rashid Ali:
Cryptanalysis and improvement of a blind multi-document signcryption scheme. Cryptologia 45(5): 450-464 (2021) - Jean-François Bouchaudy
:
Enigma: the spoils of Gustave Bertrand, or "par où tout a commencé". Cryptologia 45(4): 309-341 (2021) - Kenneth J. Bures:
Cracking PURPLE: cryptanalysis of the Angooki Taipu B switch tables. Cryptologia 45(1): 1-43 (2021) - Dimpy Chauhan, Indivar Gupta, Rashmi Verma:
Quasigroups and their applications in cryptography. Cryptologia 45(3): 227-265 (2021) - Chris Christensen:
Review of Breaking Teleprinter Ciphers at Bletchley Park by James A. Reeds, Whitfield Diffie, and J. V. Field. Cryptologia 45(1): 88-93 (2021) - Chris Christensen:
Review of Operation Vengeance: The Astonishing Aerial Ambush That Changed World War II by Dan Hampton. Cryptologia 45(5): 474-477 (2021) - Chris Christensen:
Review of The Codebreakers of Bletchley Park by Dermot Turing. Cryptologia 45(6): 563-564 (2021) - Chris Christensen:
Review of A Course in Cryptography by Heiko Knospe. Cryptologia 45(6): 565-568 (2021) - Chris Christensen:
Review of The U.S. Navy's On-the-Roof Gang, Volume Two, War in the Pacific by Matt Zullo. Cryptologia 45(6): 569-570 (2021) - Chris Christensen:
Review of Codebreaking: A Practical Guide by Elonka Dunin and Klaus Schmeh. Cryptologia 45(6): 497 (2021) - Nicolas T. Courtois
:
A nonlinear invariant attack on T-310 with the original Boolean function. Cryptologia 45(2): 178-192 (2021) - István Daruka
:
On the Voynich manuscript. Cryptologia 45(1): 44-80 (2021) - John F. Dooley
:
Review of Flight of the Fox by Gray Basnight. Cryptologia 45(3): 287-288 (2021) - Ralph Erskine:
Review of The Nazi Spy Ring in America by Rhodri Jeffreys-Jones. Cryptologia 45(4): 379-382 (2021) - José Ramón Soler Fuensanta, Héctor Soler Bonet
, Diego Navarro Bonilla
:
How to make a codebook versatile. The example of the ASLET code. Cryptologia 45(2): 129-166 (2021) - Rémi Géraud-Stewart
, David Naccache:
A French cipher from the late 19th century. Cryptologia 45(4): 342-370 (2021) - Barry J. Griffiths
:
Cryptography in undergraduate education: perceptions of postgraduate students. Cryptologia 45(6): 553-562 (2021) - Robert J. Hanyok:
Sources and methods: Searching for cryptologic records in the findings of post-World War II allied technical surveys and commissions. Cryptologia 45(4): 371-378 (2021) - George Lasry, Beáta Megyesi, Nils Kopal:
Deciphering papal ciphers from the 16th to the 18th Century. Cryptologia 45(6): 479-540 (2021) - George Lasry, Ingo Niebel, Torbjörn Andersson:
Deciphering German diplomatic and naval attaché messages from 1900-1915. Cryptologia 45(5): 383-425 (2021) - J. Mohamedmoideen Kader Mastan
, R. Pandian
:
Cryptanalysis of two similar chaos-based image encryption schemes. Cryptologia 45(6): 541-552 (2021) - Gregory J. Nedved:
Herbert O. Yardley revisited: what does the new evidence say? Cryptologia 45(2): 102-128 (2021) - Blain Patterson:
Analyzing student understanding of cryptography using the SOLO taxonomy. Cryptologia 45(5): 439-449 (2021) - Ronald Phelan, David Simpson:
Ludlings: not all fun and games. Cryptologia 45(5): 426-433 (2021) - Betsy Rohaly Smoot
:
Sources and methods: uncovering the story of American Cryptology in World War I. Cryptologia 45(1): 81-87 (2021) - Betsy Rohaly Smoot
:
Sources and methods for cryptologic history: researching individuals (and the biography boom). Cryptologia 45(5): 465-473 (2021) - Åvald Åslaugson Sommervoll, Leif Nilsen:
Genetic algorithm attack on Enigma's plugboard. Cryptologia 45(3): 194-226 (2021) - Kirsten Tate:
Identifying concealed messages using authorship attribution. Cryptologia 45(2): 167-177 (2021) - George Teseleanu
:
Quasigroups and substitution permutation networks: a failed experiment. Cryptologia 45(3): 266-281 (2021)